Glossary

This glossary includes terms and definitions for Eclipse Amlen.

The following cross-references are used in this glossary:
  • See refers you from a term to a preferred synonym, or from an acronym or abbreviation to the defined full form.
  • See also refers you to a related or contrasting term.

To view glossaries for other IBM® products, go to www.ibm.com/software/globalization/terminology (opens in new window).

A

access control
In computer security, the process of ensuring that users can access only those resources of a computer system for which they are authorized.
attribute
  1. In object-oriented programming, a property of an object or class that can be distinguished distinctly from any other properties. Attributes often describe state information.
  2. A characteristic or trait of an entity that describes the entity; for example, the telephone number of an employee is one of the employee attributes. See also entity.
authentication
A security service that provides proof that a user of a computer system is genuinely who that person claims to be. Common mechanisms for implementing this service are passwords and digital signatures.
authorization
The process of granting a user, system, or process either complete or restricted access to an object, resource, or function.
authorization check
A security check that is performed when a user or application attempts to access a system resource; for example, when an administrator attempts to issue a command to administer Eclipse Amlen.

C

certificate authority (CA)
A trusted third-party organization or company that issues the digital certificates. The certificate authority typically verifies the identity of the individuals who are granted the unique certificate. See also Secure Sockets Layer.
CIDR
See Classless Inter-Domain Routing.
CipherSpec
The combination of encryption algorithm and hash function that is applied to an SSL message after authentication completes.
cipher suite
The combination of authentication, key exchange algorithm, and the Secure Sockets Layer (SSL) cipher specification that is used for the secure exchange of data.
ciphertext
Data that is encrypted. Ciphertext is unreadable until it is converted into plaintext (decrypted) with a key.
Classless Inter-Domain Routing (CIDR)
A method for adding Internet Protocol (IP) addresses. The addresses are given to Internet Service Providers (ISPs) for use by their customers. CIDR addresses reduce the size of routing tables and make more IP addresses available within organizations.
client
Software that connects to and interacts with Eclipse Amlen, typically to take part in messaging.
cluster

A collection of Eclipse Amlen servers that are connected together on a local high-speed LAN with the goal of being able to scale either the maximum number of concurrent connections or the maximum throughput beyond the capability of a single device. Servers in a cluster share a common topic space and are known as cluster members.

cluster member

An Eclipse Amlen server that is a member of a cluster. A server can be a member of only one cluster only.

connection factory
A set of configuration values that produces connections that enable a Java™ EE component to access a resource.
connection policy
In Eclipse Amlen, a configuration object that controls which client applications can connect to Eclipse Amlen based on one ore more client attributes.
consumer
An application that receives and processes messages. See also message consumer.

D

demilitarized zone
A demilitarized zone (DMZ) is a safe zone between firewalls that is typically located between the client and the backend server.
destination
  1. An end point to which messages are sent, such as a queue or topic.
  2. In JMS, an object that specifies where and how messages should be sent and received.
DHCP
See Dynamic Host Configuration Protocol .
digital certificate
An electronic document that is used to identify an individual, a system, a server, a company, or some other entity, and to associate a public key with the entity. A digital certificate is issued by a certificate authority and is digitally signed by that authority.
digital signature
Information that is encrypted with a private key and is appended to a message or object to assure the recipient of the authenticity and integrity of the message or object. The digital signature proves that the message or object was signed by the entity that owns, or has access to, the private key or shared-secret symmetric key.
disconnect
To break the connection between an application and Eclipse Amlen.
DMZ
See demilitarized zone.
durable subscription
A subscription that is retained when the connection from a subscribing application to Eclipse Amlen is closed. When the subscribing application disconnects, the durable subscription remains in place and publications continue to be held. When the application reconnects, it can use the same subscription by specifying the unique subscription name. See also nondurable subscription.
Dynamic Host Configuration Protocol (DHCP)
A communications protocol that is used to centrally manage configuration information. For example, DHCP automatically assigns IP addresses to computers in a network.

E

Eclipse
An Open Source Initiative that provides independent software vendors (ISVs) and other tool developers with a standard platform for developing plug-compatible application development tools.
encryption
In computer security, the process of transforming data into an unintelligible form in such a way that the original data either cannot be obtained or can be obtained only by using a decryption process.
endpoint
In Eclipse Amlen, a configuration object that defines a connection point for client applications, and restricts which applications can connect based on connection policies, and messaging policies. See also, connection policy, and messaging policy.
entity
A user, group, or resource that is defined to a security service.
environment variable
A variable that specifies how an operating system or another program runs, or the devices that the operating system recognizes.

F

failover
An automatic operation that switches to a redundant or standby system in the event of a software, hardware, or network interruption.
function
A named group of statements that can be called and evaluated and can return a value to the calling statement.

H

handshake
The exchange of messages at the start of a Secure Sockets Layer session that allows the client to authenticate the server by using public key techniques (and, optionally, for Eclipse Amlen to authenticate the client) and then allows the client and Eclipse Amlen to cooperate in creating symmetric keys for encryption, decryption, and detection of tampering.
hierarchy
In topic string topology, the topic levels that make up the structure of the topic tree..
HTTP
See Hypertext Transfer Protocol.
Hypertext Transfer Protocol (HTTP)
An Internet Protocol that is used to transfer and display hypertext and XML documents on the web.

I

identification
The security service that enables each user of a computer system to be identified uniquely. A common mechanism for implementing this service is to associate a user ID with each user.
Internet Protocol (IP)
A protocol that routes data through a network or interconnected networks. This protocol acts as an intermediary between the higher protocol layers and the physical network. See also Transmission Control Protocol.
IP
See Internet Protocol.

J

Java Message Service (JMS)
An application programming interface that provides Java language functions for handling messages.
Java runtime environment (JRE)
A subset of a Java developer kit that contains the core executable programs and files that constitute the standard Java platform. The JRE includes the Java virtual machine (JVM), core classes, and supporting files.
JMS
See Java Message Service.
JRE
See Java runtime environment.

K

key authentication
See authentication.
key repository
A store for digital certificates and their associated private keys.

L

LDAP
See Lightweight Directory Access Protocol.
Lightweight Directory Access Protocol (LDAP)
An open protocol that uses TCP/IP to provide access to directories that support an X.500 model and that does not incur the resource requirements of the more complex X.500 Directory Access Protocol (DAP). For example, LDAP can be used to locate people, organizations, and other resources in an Internet or intranet directory.
log file
In Eclipse Amlen, a log that records significant events.

M

message
  1. In system programming, information that is intended for the terminal operator or system administrator.
  2. A string of bytes that is passed from one application to another. Messages typically comprise a message header (used for message routing and identification) and a payload (containing the application data that is being sent). The data has a format that is compatible with both the sending and receiving application.
message consumer
  1. A program or function that receives and processes messages. See also consumer.
  2. In JMS, an object that is created within a session to receive messages from a destination.
message hub
In Eclipse Amlen, an organizational configuration object that groups endpoints, connection policies, and messaging policies that are associated with a specific goal. See also endpoint, connection policy, and messaging policy.
message producer
In JMS, an object that is created by a session and that is used to send messages to a destination. See also producer.
message property
Data that is associated with a message, in name-value pair format. Message properties can be used as message selectors to filter publications or to selectively receives messages from queues. Message properties can be used to include business data or state information about processing without having to alter the message body.
messaging policy
In Eclipse Amlen, a configuration object that controls which client applications can use which messaging actions based on one or more client attributes.
messaging user
In Eclipse Amlen, a user that is authorized to send and receive messages. A messaging user cannot administer Eclipse Amlen. See also, applicance user.
MQ Telemetry Transport
MQ Telemetry Transport (MQTT) is an open, lightweight publish/subscribe protocol flowing over TCP/IP or WebSockets to connect large numbers of devices such as servos, actuators, smartphones, vehicles, homes, health, remote sensors, and control devices. MQTT is designed to work in environments where the network might be constrained by bandwidth, or the device might be constrained by memory or processors for example.
MQTT
See MQ Telemetry Transport

N

nesting
In Eclipse Amlen administration, a means of including a group of users within another group of users.
nondurable subscription
A subscription that exists only while the connection from the subscribing application to Eclipse Amlen remains open. The subscription is removed when the subscribing application disconnects from Eclipse Amlen either deliberately or by loss of connection. See also durable subscription.
nonpersistent message
A message that does not survive a restart of the Eclipse Amlen server. See also persistent message.
null character (NUL)
A control character with the value of X'00' that represents the absence of a displayed or printed character.

P

persistent message
A message that survives a restart of the Eclipse Amlen server. See also nonpersistent message.
PKI
See public key infrastructure.
primary node
In High Availability, the server that is processing messages. See also standby node.
producer
An application that creates and sends messages. See also message producer, publisher.
property
A characteristic of an object that describes the object. A property can be changed or modified. Properties can describe an object name, type, value, or behavior, among other things.
public key cryptography
A cryptography system that uses two keys: a public key that is known to everyone and a private or secret key that is known only to the recipient of the message. The public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them.
public key infrastructure (PKI)
A system of digital certificates, certificate authorities, and other registration authorities that verify and authenticate the validity of each party that is involved in a network transaction.
public-private key cryptography
See public key cryptography.
publish
To make information about a specified topic available.
publisher
An application that makes information about a specified topic available. See also producer.
publish/subscribe
A type of messaging interaction in which information, provided by publishing applications, is delivered by an infrastructure to all subscribing applications that registered to receive that type of information.

Q

queue
An object that holds messages for message-queueing applications.
queue policy
A queue policy is a type of messaging policy is used to control which clients can send to, receive from, or browse a specified queue.

R

RC
See return code.
reason code
A return code that describes the reason for the failure or partial success of a command.
reply message
A type of message that is used for replies to request messages. request message.
request message
A type of message that is used to request a reply from another program. See also reply message.
request/reply
A type of messaging application in which a request message is used to request a reply from another application.
return code (RC)
A value that is returned by a program to indicate the result of its processing. Completion codes and reason codes are examples of return codes.

S

SCP
See Secure Copy Protocol.
Secure Copy Protocol.
The secure transfer of computer files between a local and a remote host or between two remote hosts, by using the Secure Shell (SSH) protocol.
Secure Sockets Layer (SSL)
A security protocol that provides communication privacy. With SSL, client/server applications can communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery. See also certificate authority.
server
A software program or a computer that provides services to other software programs or other computers. See also client
session
A logical or virtual connection between two stations, software programs, or devices on a network that allows the two elements to communicate and exchange data during the session.
SSL
See Secure Sockets Layer.
standby node
In High Availability, the server to which the primary node is replicated. See also primary node.
store
The store is a component of Eclipse Amlen. The store holds data that must survive restarting the server. The data in the store consists primarily of messages that are buffered for delivery to clients. Other information that is held in the store includes durable subscriptions, and message acknowledgements.
subscribe
To request information about a topic.
subscription policy
A subscription messaging policy is a type of messaging policy that is used to control which clients can receive messages from a specified global-shared durable subscription. Subscription messaging policies are also used to control which clients can control the creation and deletion of global-shared durable subscriptions on a specified subscription name.
synchronization
In High Availability, the process of making the primary node and standby node identical after a communication downtime.

T

TCP
See Transmission Control Protocol.
TCP/IP
See Transmission Control Protocol/Internet Protocol.
topic
A topic is the subject of the information that is published in a publish/subscribe message.
topic policy
A topic policy is a type of messaging policy that specifies the topics that a client can publish or subscribe to.
topic string
A topic string is a character string that identifies the topic of a publish/subscribe message.
trace
A record of the processing of a computer program or transaction. The information that is collected from a trace can be used to assess problems and performance.
Transmission Control Protocol (TCP)
A communication protocol that is used in the Internet and in any network that follows the Internet Engineering Task Force (IETF) standards for internetwork protocol. TCP provides a reliable host-to-host protocol in packet-switched communication networks and in interconnected systems of such networks. See also Internet Protocol.
Transmission Control Protocol/Internet Protocol (TCP/IP)
An industry-standard, nonproprietary set of communication protocols that provides reliable end-to-end connections between applications over interconnected networks of different types.
type
A characteristic that specifies the internal format of data and determines how the data can be used.

U

unauthorized access
Gaining access to resources within a computer system without permission.

W

IBM MQ
A family of IBM licensed programs that provide message queuing services.